共 72 条
- [1] Bakas A., 2021, IACR Cryptol. ePrint Arch, P903
- [2] Bakas A, 2020, IEEE SYMP COMP COMMU, P39
- [3] Bao F, 2008, LECT NOTES COMPUT SC, V4991, P71
- [4] Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1465 - 1482
- [5] Σοφοζ - Forward Secure Searchable Encryption [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1143 - 1154
- [6] Byun JW, 2006, LECT NOTES COMPUT SC, V4165, P75
- [9] Leakage-Abuse Attacks Against Searchable Encryption [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 668 - 679
- [10] New Constructions for Forward and Backward Private Symmetric Searchable Encryption [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1038 - 1055